ID CVE-2006-4192
Summary Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
References
Vulnerable Configurations
  • cpe:2.3:a:modplug:tracker:*:*:*:*:*:*:*:*
    cpe:2.3:a:modplug:tracker:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 17-10-2018 - 21:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2011:0477
rpms
  • gstreamer-plugins-0:0.8.5-1.EL.3
  • gstreamer-plugins-debuginfo-0:0.8.5-1.EL.3
  • gstreamer-plugins-devel-0:0.8.5-1.EL.3
refmap via4
bid 19448
bugtraq 20060809 Stack and heap overflows in MODPlug Tracker/OpenMPT 1.17.02.43 and libmodplug 0.8
confirm
gentoo GLSA-200612-04
mandriva MDKSA-2007:001
misc http://aluigi.altervista.org/adv/mptho-adv.txt
secunia
  • 21418
  • 22080
  • 22658
  • 23294
  • 23555
  • 26979
sreason 1397
suse SUSE-SR:2006:023
ubuntu USN-521-1
vupen
  • ADV-2006-3231
  • ADV-2006-4310
xf
  • openmpt-loadit-bo(28305)
  • openmpt-readsample-bo(28309)
Last major update 17-10-2018 - 21:33
Published 17-08-2006 - 01:04
Last modified 17-10-2018 - 21:33
Back to Top